![Nmap cheat sheet: From discovery to exploits, Part 3: Gathering additional information about host and network | Infosec Resources Nmap cheat sheet: From discovery to exploits, Part 3: Gathering additional information about host and network | Infosec Resources](https://resources.infosecinstitute.com/wp-content/uploads/072214_1408_NmapCheatSh1.png)
Nmap cheat sheet: From discovery to exploits, Part 3: Gathering additional information about host and network | Infosec Resources
![Nmap cheat sheet: From discovery to exploits, Part 3: Gathering additional information about host and network | Infosec Resources Nmap cheat sheet: From discovery to exploits, Part 3: Gathering additional information about host and network | Infosec Resources](https://resources.infosecinstitute.com/wp-content/uploads/072214_1408_NmapCheatSh11.png)
Nmap cheat sheet: From discovery to exploits, Part 3: Gathering additional information about host and network | Infosec Resources
![Nmap cheat sheet: From discovery to exploits, Part 3: Gathering additional information about host and network | Infosec Resources Nmap cheat sheet: From discovery to exploits, Part 3: Gathering additional information about host and network | Infosec Resources](https://resources.infosecinstitute.com/wp-content/uploads/072214_1408_NmapCheatSh9.png)